Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security and protection of SCADA: a bigdata algorithmic approach
Shyamasundar R.  SIN 2013 (Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, Nov 26-28, 2013)20-27.2013.Type:Proceedings
Date Reviewed: Apr 16 2014

Embedded systems work between hardware and software to perform a specific function. These systems are usually part of a larger system, and wireless communication among the components of the larger system is common. Therefore, it is important to guarantee secure communication by ensuring the confidentiality of information. Security has not traditionally been considered a requirement in embedded systems design, and the application of specific security techniques to these devices is still incipient.

This very interesting paper treats the problem of security in a different way: it doesn’t just promote security in the overall embedded system, but focuses on the parts of the embedded system. The paper is well written and easy to read. Shyamasundar provides a good amount of information about security and vulnerabilities, which could be interesting for students and professionals that work with security and with embedded systems. The author also provides a good review of malware threats and different ways to treat them, and discusses when such solutions do and do not work.

Unfortunately, the author did not provide any experimental results. The deductions presented are very similar to previous work on conventional attack methods. The reader will not find concrete evidence on the use of big data algorithms in this paper. The paper does contain a good related works section that is suitable for beginners in the security area.

Reviewer:  Kalinka Castelo Branco Review #: CR142181 (1407-0543)
Bookmark and Share
 
Security and Protection (C.2.0 ... )
 
 
Database Administration (H.2.7 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy